Security update for java-1_8_0-openj9
Announcement ID: | SUSE-SU-2022:3092-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for java-1_8_0-openj9 fixes the following issues:
- Updated to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine:
- CVE-2022-34169: Fixed an integer truncation issue in the Xalan Java XSLT library that occurred when processing malicious stylesheets (bsc#1201684).
- CVE-2022-21541: Fixed a potential bypass of sandbox restrictions in the Hotspot component (bsc#1201692).
-
CVE-2022-21540: Fixed a potential bypass of sandbox restrictions in the Hotspot component (bsc#1201694).
-
Updated to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine:
- CVE-2021-41041: Failed an issue that could allow unverified methods to be invoked using MethodHandles (bsc#1198935).
- CVE-2022-21426: Fixed a remote partial denial of service issue (component: JAXP) (bsc#1198672).
- CVE-2022-21434: Fixed an issue that could allow a remote attacker to update, insert or delete data (component: Libraries) (bsc#1198674).
- CVE-2022-21443: Fixed a remote partial denial of service issue (component: Libraries) (bsc#1198675).
- CVE-2022-21476: Fixed an issue that could allow unauthorized access to confidential data (component: Libraries) (bsc#1198671).
- CVE-2022-21496: Fixed an issue that could allow a remote attacker to update, insert or delete data (component: JNDI) (bsc#1198673).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2022-3092=1
Package List:
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- java-1_8_0-openj9-debuginfo-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-headless-debuginfo-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-debugsource-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-devel-debuginfo-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-demo-debuginfo-1.8.0.345-150200.3.24.1
- java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1
-
openSUSE Leap 15.4 (noarch)
- java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1
References:
- https://www.suse.com/security/cve/CVE-2021-41041.html
- https://www.suse.com/security/cve/CVE-2022-21426.html
- https://www.suse.com/security/cve/CVE-2022-21434.html
- https://www.suse.com/security/cve/CVE-2022-21443.html
- https://www.suse.com/security/cve/CVE-2022-21476.html
- https://www.suse.com/security/cve/CVE-2022-21496.html
- https://www.suse.com/security/cve/CVE-2022-21540.html
- https://www.suse.com/security/cve/CVE-2022-21541.html
- https://www.suse.com/security/cve/CVE-2022-34169.html
- https://bugzilla.suse.com/show_bug.cgi?id=1198671
- https://bugzilla.suse.com/show_bug.cgi?id=1198672
- https://bugzilla.suse.com/show_bug.cgi?id=1198673
- https://bugzilla.suse.com/show_bug.cgi?id=1198674
- https://bugzilla.suse.com/show_bug.cgi?id=1198675
- https://bugzilla.suse.com/show_bug.cgi?id=1198935
- https://bugzilla.suse.com/show_bug.cgi?id=1201684
- https://bugzilla.suse.com/show_bug.cgi?id=1201692
- https://bugzilla.suse.com/show_bug.cgi?id=1201694